New Partnership Agreement Enhances Infinigate Security Portfolio and Supports 'ASTORS' Nominee Versa Networks Expansion into EMEA Markets

‘ASTORS’ Nominee Partners to Bring Unified SASE to EMEA Enterprises

Versa Networks, a global leader in AI/ML-powered Unified Secure Access Service Edge (SASE), and the Gold 'ASTORS' Award Champion for Best Network Security Solution in AST's 2021 Homeland Security Awards Program,...
Mona Harrington Assistant Director for the National Risk Management Center

New CISA HBOM Framework for Supply Chain Risk Management

The Cybersecurity and Infrastructure Security Agency (CISA), a Multiple Award Winner in the 2022 'ASTORS' Homeland Security Awards Program, has released a new Hardware Bill of Materials Framework (HBOM) for Supply...
“We’re extremely impressed with the company’s vision and execution in this market to date, and we look forward to helping the new company (CodeSecure) grow organically and, potentially, through acquisitions,” added Battery Partner Jordan Welu, who is also joining the company’s board.

CodeSecure: ‘ASTORS’ Homeland Security Nominee CodeSentry

GrammaTech, a high-profile provider of application security testing products and software research services, and Multi-Award Champion in the Annual 'ASTORS' Homeland Security Awards Program, announced its software products division, including the...

Unveil the Paradox of Encryption with TLS 1.3 in Zero Trust Architectures

Guest Editorial by Scott Aken, CEO, Axellio Introduction: A New Era of Data Encryption In today’s increasing threat landscape, secure data transmission has become paramount, and end-to-end data encryption is vital to protecting...
Learn How the SolarWinds Next-Generation Build System is Setting the New Standard in Secure Software Development (Courtesy of SolarWinds)

SolarWinds Next-Generation Build System Aligns with NIST SSDF

SolarWinds, the 2022 Platinum 'ASTORS' Homeland Security Award Winner for Best IT Access Control & Authentication Solution, recently Nominated to Compete in the 2023 'ASTORS' Awards Program, is pleased to announce...
“When it comes to cybersecurity, it’s important to rely on facts from a third-party organization with groups of peer-reviewed data scientists and mathematicians whose sole focus is to think about security all day, every day,” explains Will Knehr, Senior Manager of Information Assurance and Data Privacy at i-PRO Americas.

i-PRO: How to Advance Cybersecurity with Secure Element & FIPS

With the ever increasing rise in cybercrime, i-PRO Americas, a global leader in professional security solutions for surveillance and public safety, and a Platinum 'ASTORS' Homeland Security Award Winner in 2022,...
Learn how with 1Kosmos BlockID, Workers, Customers, and Citizens can Login with a Blink and Smile. It's Easy to Implement and Users Love it! (Courtesy of 1Kosmos)

1Kosmos BlockID Latest Nominee in 2023 ‘ASTORS’ Awards Program

Identity fraud is running rampant. The FTC reported that losses due to impersonation fraud spiked 70% in 2021, and the trend has continued upward. In the wake of escalating data breaches...
Cyber attacks are on the rise and the only way to defend against them is to be proactive, pre-emptive and catch them BEFORE they take hold. (Courtesy of Cyemptive Technologies and Twitter)

Ray McCay Joins Cyemptive as New Chief Revenue Officer

Cyemptive Technologies, a Multi-Award Winner in the 2022 'ASTORS' Homeland Security Awards Program, has continued its series of strategic actions to scale the company up for the next level of growth...
Encryption No organization should rely solely on encryption to protect data. You need a more holistic, layered approach, explains Forcepoint Global CTO Petko Soyanov

Chinese Researchers Say They Broke RSA Encryption. Will That Affect You?

Guest editorial by Petko Soyanov, Global CTO of Forcepoint Late last year, Chinese researchers claimed to use quantum computing to break an RSA public-key encryption algorithm. While many quantum experts expressed skepticism, the...
whether it’s lack of awareness, poor asset and device management, insufficient resources and personnel, working with cybersecurity firms that don’t adequately protect themselves, or neglecting to share information—the result is that organizations across a wide range of industries have become increasingly vulnerable to stealthier and more sophisticated methods of cyber espionage. hackers

How to Protect Yourself From Increasingly Sneaky Hacking Tactics

Guest Editorial by Dr. Brian Gant, Assistant Professor of Cybersecurity at Maryville University It turns out that an effective way for hackers to infiltrate networks is not by targeting those networks directly...